A low-privileged remote attacker could exploit the vulnerability and inject additional system commands via file system libraries which could give the attacker full control of the device.
This Cyber News was published on www.tenable.com. Publication date: Thu, 07 Dec 2023 13:23:20 +0000